mastodon.bida.im is part of the decentralized social network powered by Mastodon.
Un'istanza mastodon antifascista. autogestita, italofona con base a Bologna. Rispettosa di privacy e anonimato.

Server stats:

943
active users

Learn more

#wireguard

0 posts0 participants0 posts today
Attractive Nuisance<p>I'm interested in setting up <a href="https://tech.lgbt/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> on my <a href="https://tech.lgbt/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> colo, as a <a href="https://tech.lgbt/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> solution for my phone when I'm on untrusted networks. But the quick start guide being a video is really putting me off, and the examples seem to be purely about ad-hoc peer-to-peer networking rather than a gateway.</p><p>I'm tempted to go back to my comfort zone with <a href="https://tech.lgbt/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a>, but I'll stick with it. At some point it'll click and I'll write a HOWTO.</p>
Georg Ruß<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@zak" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>zak</span></a></span> I'm running <a href="https://swiss.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> with exit nodes on my home network, so when I enable it on my phone, I get both ad-blocking DNS (pihole at home) and access to home resources at the same time. Based on <a href="https://swiss.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>.</p>
Ken Walker :caflag:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Edent" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Edent</span></a></span> I use <a href="https://cosocial.ca/tags/freedombox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freedombox</span></a> which includes <a href="https://cosocial.ca/tags/nextcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nextcloud</span></a>. I wonder if this means I can't run <a href="https://cosocial.ca/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a>?</p>
Terence Eden<p>FFS! A server can't run both <a href="https://mastodon.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> *and* <a href="https://mastodon.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> on <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>.</p><p>Docker creates a "bridge" network interface which, apparently, interferes with WireGuard.</p><p>That was a depressing evening of eliminating the impossible. Completely stopping Docker allowed my VPN to connect.</p><p>And there's no way to actually run a Docker container without the network bridge (any documentation that says otherwise is lying).</p>
Astian, Inc<p>First look Midori Browser with browsing VPN.</p><p>Midori Browser with VPN.... coming soon.</p><p>Behind all this there is <span class="h-card" translate="no"><a href="https://fosstodon.org/@opensuse" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>opensuse</span></a></span> being the best distro :-)</p><p><a href="https://mastodon.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/macos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macos</span></a> <a href="https://mastodon.social/tags/midoribrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midoribrowser</span></a> <a href="https://mastodon.social/tags/midori" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>midori</span></a> <a href="https://mastodon.social/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <a href="https://mastodon.social/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a></p>
Rince<p>Kennt jemand eine Open Source-Variante von <a href="https://chaos.social/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a>? <a href="https://chaos.social/tags/WIreguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WIreguard</span></a> ist einfach, aber das zentral zu managen finde ich angenehm, mit einem <a href="https://chaos.social/tags/Zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zero</span></a>-Trust-Ansatz ist das hübsch....</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://zeroes.ca/@StaceyCornelius" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>StaceyCornelius</span></a></span> In the past I did configure seperate systems for clients so they can travel without fuss regardless if <em>"P.R."</em> <a href="https://infosec.space/tags/China" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>China</span></a> or <a href="https://infosec.space/tags/Russia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Russia</span></a> or the <a href="https://infosec.space/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> or <a href="https://infosec.space/tags/KSA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KSA</span></a>...</p><ul><li>The trick is to never have anything on your device and have a dedicaded burner!</li></ul><p>Using <span class="h-card" translate="no"><a href="https://venera.social/profile/tails_live" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails_live</span></a></span> / <span class="h-card" translate="no"><a href="https://fosstodon.org/@tails" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>tails</span></a></span> / <a href="https://infosec.space/tags/Tails" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tails</span></a> and <span class="h-card" translate="no"><a href="https://mastodon.social/@torproject" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>torproject</span></a></span> / <a href="https://infosec.space/tags/TorBrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TorBrowser</span></a> and when that's not an option, a <a href="https://infosec.space/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a>-Tunnel / <a href="https://infosec.space/tags/OpenVPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenVPN</span></a> or <a href="https://infosec.space/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a>-<a href="https://infosec.space/tags/VPN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPN</span></a> to be able to <a href="https://infosec.space/tags/VNC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VNC</span></a> into a machine.</p><ul><li>Remember: They can only extract data that was saved on a machine!</li></ul><p>CONSIDER THE <a href="https://infosec.space/tags/US" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>US</span></a> ENEMY TERRITORY AS IN <em>"If you wouldn't enter <a href="https://infosec.space/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a>, then why would you enter the USA?"</em></p><p><a href="https://infosec.space/tags/Cyberfacism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberfacism</span></a> <a href="https://infosec.space/tags/USpol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USpol</span></a> <a href="https://infosec.space/tags/Facism" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Facism</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ComSec</span></a></p>
aiyion<p>Der neue OpenWrt One spricht Freifunk.<br>Und da das LeineLab über einen hervorragenden Laser verfügt, haben wir die Skyline Hannovers verstetigt.</p><p>Richtig gutes Gerät übrigens. WireGuard Speedtest Nutztraffic 330Mbit/s down, 230Mbit/s up.</p><p><a href="https://infosec.exchange/tags/freifunk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freifunk</span></a> <a href="https://infosec.exchange/tags/gluon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gluon</span></a> <a href="https://infosec.exchange/tags/openwrt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openwrt</span></a> <a href="https://infosec.exchange/tags/leinelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leinelab</span></a> <a href="https://infosec.exchange/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <span class="h-card" translate="no"><a href="https://friendica.me/profile/freifunkh" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>freifunkh</span></a></span></p>
Alex<p>Wow, <a href="https://swiss.social/tags/ChatGPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ChatGPT</span></a> actually helped me debug a networking issue I had. My <a href="https://swiss.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> tunnel did not work as expected, most traffic was tunnelled just fine, but some websites I tried to access through it did not want to load and just timed out, even though curl showed me that DNS worked and that it could connect.<br>The culprit: MTU. Setting it slightly lower to 1410 seemed to fix it for me. Probably due to PPPoE..<br><a href="https://swiss.social/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://swiss.social/tags/itsnotalwaysDNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsnotalwaysDNS</span></a></p>
Matthias Klein 🇩🇪|🇪🇺<p>🌐 In the past three days, I've switched my <a href="https://social.klein.ruhr/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> to a new <a href="https://social.klein.ruhr/tags/ReverseProxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseProxy</span></a>! After using <a href="https://social.klein.ruhr/tags/NginxProxyManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NginxProxyManager</span></a> and <a href="https://social.klein.ruhr/tags/Zoraxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zoraxy</span></a>, I've now moved to <a href="https://social.klein.ruhr/tags/Pangolin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pangolin</span></a>.</p><p>Pangolin allows me to provide my <a href="https://social.klein.ruhr/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> services from my home lab without needing to open a port in my <a href="https://social.klein.ruhr/tags/firewall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firewall</span></a>. 🔒</p><p>Essentially, it's a self-hosted alternative to <a href="https://social.klein.ruhr/tags/CloudflareTunnels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudflareTunnels</span></a>, running on a <a href="https://social.klein.ruhr/tags/VPS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VPS</span></a>. Due to the current political situation in the <a href="https://social.klein.ruhr/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a>, I preferred not to use Cloudflare.</p><p>Pangolin is based on <a href="https://social.klein.ruhr/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> and <a href="https://social.klein.ruhr/tags/Newt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Newt</span></a>, enabling a <a href="https://social.klein.ruhr/tags/certificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>certificate</span></a>-based direct connection after installing a client on the home server. 🔗</p><p>I'm extremely satisfied with it and now have no open ports in my private <a href="https://social.klein.ruhr/tags/network" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>network</span></a>! 🎉</p><p><a href="https://github.com/fosrl/pangolin" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fosrl/pangolin</span><span class="invisible"></span></a></p>
Ken Fallon (PA7KEN, G5KEN)<p>Anyone using <a href="https://mastodon.sdf.org/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> on <a href="https://mastodon.sdf.org/tags/fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fritzbox</span></a> out there ?</p><p>I believe I was able to set up wireguard on my Fritz!Box without needing to create a cloud account.</p><p>AVM are saying this was never possible but when I did sign up all the spam they sent me was from an account I never seen before. </p><p>Can anyone confirm this ? </p><p>Please boost.</p><p><a href="https://mastodon.sdf.org/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a></p>
HoldMyType<p>Why use <a href="https://mathstodon.xyz/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> jump host as a tunnel , when you can use <a href="https://mathstodon.xyz/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> with <a href="https://mathstodon.xyz/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> ssh?<br><a href="https://mathstodon.xyz/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a></p>
HoldMyType<p>where does <a href="https://mathstodon.xyz/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> logs <a href="https://mathstodon.xyz/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> request errors? <br>Like <a href="https://mathstodon.xyz/tags/openvpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openvpn</span></a> , atm being refused for connecti9n<br>Also how do i mod resolve.conf on phone <br>Fwiw its ( wifi connection )peered to my machine ( lan connection form same router, which not a node )<br>I am yet to fix resolve. Conf for wg on my machine but what does that have to with another peer ?<br>Is it what i think it is ?</p>
ToastI just donated 50 USD (~45 EUR) to <a class="hashtag" href="https://donotsta.re/tag/wireguard" rel="nofollow noopener noreferrer" target="_blank">#WireGuard</a>.<br>I actually asked Jason at FOSDEM where the donation page was (I somehow forgot and my mind blocked it out from the front page, it's here: <a href="https://www.wireguard.com/donations/" rel="nofollow noopener noreferrer" target="_blank">https://www.wireguard.com/donations/</a> ).<br>I tried to do it immediately, but the stripe integration broke. It's still broken (I only got around to retrying today), so I went through Github Sponsors.<br>You should support the project too! It's kinda peak.
Ducky Fella<p>Does anyone know a good <a href="https://cupoftea.social/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://cupoftea.social/tags/vpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vpn</span></a> solution, preferably with <a href="https://cupoftea.social/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a>?</p><p>I’m looking to replace my current <a href="https://cupoftea.social/tags/WireGuard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WireGuard</span></a> setup with something I can easily set up on a new device when away from home. Needs to run in a <a href="https://cupoftea.social/tags/Docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Docker</span></a> container. </p><p>Tried <a href="https://cupoftea.social/tags/HeadScale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HeadScale</span></a> this morning which worked well but couldn’t get the exit-node functionality to work, which would be a requirement for me. All suggestions appreciated!</p>
HoldMyType<p>last bit<br>configure <a href="https://mathstodon.xyz/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> peer</p>
Dave🌱<p>This is, like my <a href="https://bitbang.social/tags/SelfHosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SelfHosted</span></a> <a href="https://bitbang.social/tags/Gitea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gitea</span></a> instance, publicly exposed through <a href="https://bitbang.social/tags/Pangolin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pangolin</span></a> (<a href="https://github.com/fosrl/pangolin" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/fosrl/pangolin</span><span class="invisible"></span></a>) using <a href="https://bitbang.social/tags/Wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wireguard</span></a> tunnels. Even though Pangolin is in its early stages, it's been very nice to use and having a graphical user interface to configure some of these bits and pieces has been quite convenient.<br>I know I'll be sacrificing some speed by not having things directly exposed, the security benefits and not having to worry about dynamic IPs and all more than makes up for it I think.</p>
Carsten O. 💚🌻📯<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Hiro0815" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Hiro0815</span></a></span> okay.<br>Da ich wegen der <a href="https://troet.cafe/tags/datensouveranitat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datensouveranitat</span></a> schon seit Jahren meine Emails zuhause halte ist ein funktionierender Zugang essenziell.</p><p>Um das Problem des DSlite zu umgehen habe ich einen VPN-Tunnel von <a href="https://troet.cafe/tags/Portunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portunity</span></a>. Der landet auf einer VM im <a href="https://troet.cafe/tags/Proxmox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Proxmox</span></a>.<br>Da läuft auch der <a href="https://troet.cafe/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> Server, über den sich unsere Geräte vernetzen.<br>Und dann ist da noch der <a href="https://troet.cafe/tags/HomeAssistant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeAssistant</span></a> als dritte Instanz.<br>Dann stimmt das Kosten-Nutzen-Verhältnis</p>
Audric<p>estoy tratando de migrar de <a href="https://tkz.one/tags/tailscale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tailscale</span></a> a <a href="https://tkz.one/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> <br>como gestionar (usar, compartir internamente) <a href="https://tkz.one/tags/DNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DNS</span></a> propias / interna en <a href="https://tkz.one/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> ?<br><span class="h-card" translate="no"><a href="https://xarxa.cloud/@t3rr0rz0n3" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>t3rr0rz0n3</span></a></span> <span class="h-card" translate="no"><a href="https://rebel.ar/@matiargs" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>matiargs</span></a></span> <span class="h-card" translate="no"><a href="https://social.lol/@samcre" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>samcre</span></a></span> </p><p>se agradece <a href="https://tkz.one/tags/boost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boost</span></a></p>
Audric<p>es posible combinar <a href="https://tkz.one/tags/wireguard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wireguard</span></a> con <a href="https://tkz.one/tags/protonvpn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>protonvpn</span></a> ?<br>se agradece <a href="https://tkz.one/tags/boost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>boost</span></a></p>